A flaw was found in the mod_fcgid module of httpd. A malformed FastCGI response may result in a stack-based buffer overflow in the modules/fcgid/fcgid_bucket.c file in the fcgid_header_bucket_read() function, resulting in an application crash.
https://issues.apache.org/bugzilla/show_bug.cgi?id=49406
https://github.com/apache/httpd-mod_fcgid/commit/b1afa70840b4ab4e6fbc12ac8798b2f3ccc336b2
https://exchange.xforce.ibmcloud.com/vulnerabilities/63303
https://bugzilla.redhat.com/show_bug.cgi?id=2248172
https://access.redhat.com/security/cve/CVE-2010-3872
http://www.vupen.com/english/advisories/2011/0031
http://www.vupen.com/english/advisories/2010/2998
http://www.vupen.com/english/advisories/2010/2997
http://www.securityfocus.com/bid/44900
http://www.gossamer-threads.com/lists/apache/announce/391406
http://www.debian.org/security/2010/dsa-2140
http://secunia.com/advisories/42815
http://secunia.com/advisories/42302
http://secunia.com/advisories/42288
http://lists.opensuse.org/opensuse-security-announce/2011-08/msg00005.html
http://lists.opensuse.org/opensuse-security-announce/2011-08/msg00004.html
http://lists.fedoraproject.org/pipermail/package-announce/2010-November/050976.html
http://lists.fedoraproject.org/pipermail/package-announce/2010-November/050932.html
http://lists.fedoraproject.org/pipermail/package-announce/2010-November/050930.html